Investigating Students’ Intentions to Use ICT: A Comparison of Theoretical Models C Buabeng-Andoh, W Yaokumah, A Tarhini Education and Information Technologies 24 (1), 643-660, 2019 | 72 | 2019 |
Demographic Influences on E-Payment Services W Yaokumah, P Kumah, E Okai International Journal of E-Business Research (IJEBR) 13 (1), 43-63, 2017 | 62 | 2017 |
An empirical examination of the relationship between information security/business strategic alignment and information security governance domain areas W Yaokumah, S Brown Journal of Law and Governance 9 (2), 51–66-51–66, 2014 | 51 | 2014 |
SETA and Security Behavior - Mediating Role of Employee Relations, Monitoring, and Accountability W Yaokumah, D Walker, P Kumah Journal of Global Information Management (JGIM) 27 (2), 102-121, 2019 | 42 | 2019 |
Information security governance implementation within Ghanaian industry sectors - An empirical study W Yaokumah Journal of Information Management and Computer Security 22 (3), 235-250, 2014 | 34 | 2014 |
Examining the Contributing Factors for Cloud Computing Adoption in a Developing Country W Yaokumah, R Amponsah International Journal of Enterprise Information Systems (IJEIS) 13 (1), 17-37, 2017 | 28 | 2017 |
The Role of Norms in Information Security Policy Compliance I Wiafe, FN Koranteng, A Wiafe, EN Obeng, W Yaokumah Information & Computer Security 28 (5), 743-761, 2020 | 26 | 2020 |
Accessibility, Quality and Performance of Government Portals and Ministry Web Sites: A View Using Diagnostic Tools W Yaokumah, S Brown, R Amponsah In 2015 Annual Global Conference on Information and Computer Technology IEEE …, 2015 | 25 | 2015 |
Information Technology Governance Barriers, Drivers, IT/Business Alignment, and Maturity in Ghanaian Universities W Yaokumah, S Brown, POM Adjei International Journal of Information Systems in the Service Sector (IJISSS …, 2015 | 24 | 2015 |
Using Deep Learning for Acoustic Event Classification: The Case of Natural Disasters AO Ekpezu, I Wiafe, F Katsriku, W Yaokumah The Journal of the Acoustical Society of America 149 (4), 2926-2935, 2021 | 21 | 2021 |
Predicting and Explaining Cyber Ethics with Ethical Theories W Yaokumah International Journal of Cyber Warfare and Terrorism (IJCWT) 10 (2), 46-63, 2020 | 14 | 2020 |
Identifying HRM Practices for Improving Information Security Performance: An Importance-Performance Map Analysis P Kumah, W Yaokumah, C Buabeng-Andoh International Journal of Human Capital and Information Technology …, 2018 | 13* | 2018 |
A Systematic Review of Fingerprint Recognition Systems Development JK Appati, W Yaokumah International Journal of Software Science and Computational Intelligence …, 2022 | 11 | 2022 |
Evaluating the Effectiveness of Information Security Governance Practices in Developing Nations: A Case of Ghana W Yaokumah International Journal of IT/Business Alignment and Governance (IJITBAG) 4 (1 …, 2013 | 11 | 2013 |
Cyber-Identity Theft and FinTech Services: Technology Threat Avoidance Perspective KO Asante-Offei, W Yaokumah Journal of Information Technology Research (JITR) 14 (3), 1-19, 2021 | 10 | 2021 |
A Conceptual Model and Empirical Assessment of HR Security Risk Management P Kumah, W Yaokumah, E Okai Information and Computer Security 27 (3), 411–433, 2019 | 10 | 2019 |
Modern Theories and Practices for Cyber Ethics and Security Compliance W Yaokumah, M Rajarajan, JD Abdulai, I Wiafe, FA Katsriku IGI Global 1, 1-302, 2020 | 9 | 2020 |
Integrated Financial Management Information System Project Implementation in Ghana Government Ministries W Yaokmah, E Biney International Journal of Information Technology Project Management (IJITPM …, 2020 | 9 | 2020 |
Students’ Intentions on Cyber Ethics Issues I Wiafe, W Yaokumah, FA Kissi Modern Theories and Practices for Cyber Ethics and Security Compliance 1 …, 2020 | 7 | 2020 |
Towards Modelling the Impact of Security Policy on Compliance W Yaokumah, S Brown, AA Dawson Journal of Information Technology Research (JITR) 9 (2), 1-16, 2016 | 7 | 2016 |